Comp Obj
1-10ACDCBDDCAB
11-20BADDCBBCDB
21-30ABBDABCBCB
31-40BCBAACCCBA
41-50DBDDCBCCDB
Theory answers
1a) An input device is any hardware device that
sends data to a computer, allowing you to
interact with and control the computer. The
picture shows a Logitech trackball mouse, an
example of an input device.
.
1b i) key board
ii) The mouse
.
1c) i) Logic gates are digital components that
typically work two levels of voltage and
determine how a component conducts
electricity.
.
ii) Logic gates use Boolean
equations and switch tables.
.
1d)
(3a)
information is an analyzed or processed data, which is now
more meaningful and decisions can be made based on its
data and information is connected.
.
Communication technology is the activity of designing,
constructing and maintaining communication systems. In
the modern era it is referred to as ICT. This is information
and communications technology, and includes any
communication device or application such as radio and
television.
.
(3b)
LAN-local area network
GPS-global postioning Service.
IP-internet protocol
.
(3b)
LAN-local area network
GPS-global postioning Service.
IP-internet protocol
============
.
4a)
complet the table
1)RAM is volatile i.e. its contents are
lost when the ddevice is powered
off.
ROM is non-volatile i.e. its contents
are retained even when the device is
powered off.
2)RAM allows the computer to read
data quickly to run applications. It
allows reading and writing.
ROM stores the program required to
initially boot the computer. It only
allows reading.
=========================
.4b)
i)Searching and Organizing
ii)Ease of Access Center
iii)Default Programs
iv)Remote Desktop Connection
4c)
i)antivirus programs
ii)registry cleaners
(4b)ii.
+Password-protect
+documents encryption
+Secure wireless transmissions
5a)
10110112
=1*2^6+0*2^5+1*2^4+1*2^3+0*2^2+1*2^1+1*2^0
=1*64+0*32+1*16+1*8+0*4+1*2+1*1
=64+0+16+8+0+2+1
=91
tabulate
16|91
5 r B
O r 5
10110112=5B16
were B is 11
5b)
HACKER
i) A hack group getting main owner on an XAT chat without authorization.
SCAMMER
ii)Tricking an internet user into giving you his/her login name and password
5c)
i)HTML:Hypertext Markup Language
ii)HTTP: Hypertext Transfer Protocol
iii)ISP: Internet Service Language
iv)SMTP: Simple Mail Transfer Protocol.
Typing.......